-
1
-
-
77955319555
-
From secrecy to soundness: efficient verification via secure computation
-
Applebaum, B., Ishai, Y., Kushilevitz, E.: From secrecy to soundness: efficient verification via secure computation. In: ICALP 2010, pp. 152-163 (2010).
-
(2010)
ICALP 2010
, pp. 152-163
-
-
Applebaum, B.1
Ishai, Y.2
Kushilevitz, E.3
-
2
-
-
68249129760
-
-
Berkeley University
-
Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: Above the cloud: a Berkeley view of cloud computing. Berkeley University (2009).
-
(2009)
Above the cloud: A Berkeley view of cloud computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
3
-
-
77955095511
-
A cost-benefit analysis of using cloud computing to extend the capacity of clusters
-
Assuncao, M. D., Costanzo, A., Buyya, R.: A cost-benefit analysis of using cloud computing to extend the capacity of clusters. Clust. Comput. 13(3), 335-347 (2010).
-
(2010)
Clust. Comput.
, vol.13
, Issue.3
, pp. 335-347
-
-
Assuncao, M.D.1
Costanzo, A.2
Buyya, R.3
-
4
-
-
77954521120
-
Securely outsourcing linear algebra computations
-
Atallah, M. J., Frikken, K. B.: Securely outsourcing linear algebra computations. In: AISACCS 2010, pp. 48-59 (2010).
-
(2010)
AISACCS 2010
, pp. 48-59
-
-
Atallah, M.J.1
Frikken, K.B.2
-
6
-
-
84857752323
-
Delegatable homomorphic encryption with applicatoins to secure outsourcing of computation
-
LNCS, Heidelberg: Springer
-
Barbosa, M., Farshim, P.: Delegatable homomorphic encryption with applicatoins to secure outsourcing of computation. In: CT-RSA 2012. LNCS, vol. 7178, pp. 296-312. Springer, Heidelberg (2012).
-
(2012)
CT-RSA 2012
, vol.7178
, pp. 296-312
-
-
Barbosa, M.1
Farshim, P.2
-
7
-
-
80051977699
-
Verifiable delegation of computation over large datasets
-
LNCS, Heidelberg: Springer
-
Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: CRYPTO 2011. LNCS, vol. 6841, pp. 111-131. Springer, Heidelberg (2011).
-
(2011)
CRYPTO 2011
, vol.6841
, pp. 111-131
-
-
Benabbas, S.1
Gennaro, R.2
Vahlis, Y.3
-
8
-
-
67650080189
-
Private and cheating-free outsourcing of algebraic computations
-
Benjamin, D., Atallah, M. J.: Private and cheating-free outsourcing of algebraic computations. In: PST 2008, pp. 240-245 (2008).
-
(2008)
PST 2008
, pp. 240-245
-
-
Benjamin, D.1
Atallah, M.J.2
-
9
-
-
84957610823
-
Speeding up discrete log and factoring based schemes via precomputation
-
LNCS, Heidelberg: Springer
-
Boyko, V., Peinado, M.: Speeding up discrete log and factoring based schemes via precomputation. In: EUROCRRYPTO 1998. LNCS, vol. 1403, pp. 221-232. Springer, Heidelberg (1998).
-
(1998)
EUROCRRYPTO 1998
, vol.1403
, pp. 221-232
-
-
Boyko, V.1
Peinado, M.2
-
10
-
-
84861777392
-
Software architecture definition for on-demand cloud provisioning
-
Chapman, C., Emmerich, W., Marquez, F. G., Clayman, S., Galis, A.: Software architecture definition for on-demand cloud provisioning. Clust. Comput. 15(2), 79-100 (2012).
-
(2012)
Clust. Comput.
, vol.15
, Issue.2
, pp. 79-100
-
-
Chapman, C.1
Emmerich, W.2
Marquez, F.G.3
Clayman, S.4
Galis, A.5
-
11
-
-
85001025766
-
Wallet database with observers
-
LNCS, Heidelberg: Springer
-
Chaum, D., Pedersen, T. P.: Wallet database with observers. In: CRYPTO 1992. LNCS, vol. 740, pp. 89-105. Springer, Heidelberg (1993).
-
(1993)
CRYPTO 1992
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
12
-
-
84865597567
-
New algorithms for secure outsourcing of modular exponentiations
-
LNCS, Heidelberg: Springer
-
Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012).
-
(2012)
ESORICS 2012
, vol.7459
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
13
-
-
77957002840
-
Improved delegation of computation using fully homomorphic encryption
-
LNCS, Heidelberg: Springer
-
Chung, K. M., Kalai, Y., Vadhan, S. P.: Improved delegation of computation using fully homomorphic encryption. In: CRYPTO 2010. LNCS, vol. 6223, pp. 483-501. Springer, Heidelberg (2010).
-
(2010)
CRYPTO 2010
, vol.6223
, pp. 483-501
-
-
Chung, K.M.1
Kalai, Y.2
Vadhan, S.P.3
-
14
-
-
0000951613
-
Improved low-density subset sum algorithms
-
Coster, M. J., LaMacchia, B. A., Odlyzko, A. M., Schnorr, C. P., Stern, J.: Improved low-density subset sum algorithms. Comput. Complex. 2(2), 111-128 (1992).
-
(1992)
Comput. Complex.
, vol.2
, Issue.2
, pp. 111-128
-
-
Coster, M.J.1
LaMacchia, B.A.2
Odlyzko, A.M.3
Schnorr, C.P.4
Stern, J.5
-
15
-
-
77957005936
-
Non-interactive verifiable computing: outsourcing computation to untrusted workers
-
LNCS, Heidelberg: Springer
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010).
-
(2010)
CRYPTO 2010
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
17
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186-208 (1989).
-
(1989)
SIAM J. Comput.
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
18
-
-
57049095424
-
Delegating computation: interactive proofs for muggles
-
Goldwasser, S., Kalai, Y. T., Rothblum, G. N.: Delegating computation: interactive proofs for muggles. In: Proceeding of ACM Symposium on Theory of Computing (STOC), pp. 113-122 (2008).
-
(2008)
Proceeding of ACM Symposium on Theory of Computing (STOC)
, pp. 113-122
-
-
Goldwasser, S.1
Kalai, Y.T.2
Rothblum, G.N.3
-
19
-
-
84937555419
-
Uncheatable distributed computation
-
LNCS, Heidelberg: Springer
-
Golle, P., Mironov, I.: Uncheatable distributed computation. In: CT-RSA 2001. LNCS, vol. 2020, pp. 425-550. Springer, Heidelberg (2001).
-
(2001)
CT-RSA 2001
, vol.2020
, pp. 425-550
-
-
Golle, P.1
Mironov, I.2
-
21
-
-
24144493423
-
How to securely outsource cryptographic computations
-
LNCS, Heidelberg: Springer
-
Hohenbergera, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005).
-
(2005)
TCC 2005
, vol.3378
, pp. 264-282
-
-
Hohenbergera, S.1
Lysyanskaya, A.2
-
22
-
-
0016047180
-
Computing partitions with applications to the knapsack problem
-
Horowitz, E., Sahni, S.: Computing partitions with applications to the knapsack problem. J. ACM 21(2), 277-292 (1974).
-
(1974)
J. ACM
, vol.21
, Issue.2
, pp. 277-292
-
-
Horowitz, E.1
Sahni, S.2
-
23
-
-
84937432284
-
Secure server-aided signature generation
-
LNCS, Heidelberg: Springer
-
Jakobsson, M., Wetzel, S.: Secure server-aided signature generation. In: PKC 2001. LNCS, vol. 1992, pp. 383-401. Springer, Heidelberg (2001).
-
(2001)
PKC 2001
, vol.1992
, pp. 383-401
-
-
Jakobsson, M.1
Wetzel, S.2
-
25
-
-
84957654400
-
Improved efficient arguments
-
LNCS, Heidelberg: Springer
-
Kilian, J.: Improved efficient arguments. In: CRYPTO 1995. LNCS, vol. 963, pp. 311-324. Springer, Heidelberg (1995).
-
(1995)
CRYPTO 1995
, vol.963
, pp. 311-324
-
-
Kilian, J.1
-
26
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
LNCS, Heidelberg: Springer
-
Matsumoto, T., Kato, K., Iami, H.: Speeding up secret computations with insecure auxiliary devices. In: CRYPTO 1990. LNCS, vol. 403, pp. 497-506. Springer, Heidelberg (1990).
-
(1990)
CRYPTO 1990
, vol.403
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Iami, H.3
-
29
-
-
84858307151
-
How to delegate and verify in public: verifiable computation from attribute-based encryption
-
LNCS
-
Parno, B., Raykova, M., Vaikuntanathan, V.: How to delegate and verify in public: verifiable computation from attribute-based encryption. In: TCC 2012. LNCS, vol. 7194, pp. 422-439 (2012).
-
(2012)
TCC 2012
, vol.7194
, pp. 422-439
-
-
Parno, B.1
Raykova, M.2
Vaikuntanathan, V.3
-
30
-
-
84865465739
-
Dynamic credentials and ciphertext delegation for attribute-based encryption
-
LNCS, Heidelberg: Springer
-
Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012).
-
(2012)
CRYPTO 2012
, vol.7417
, pp. 199-217
-
-
Sahai, A.1
Seyalioglu, H.2
Waters, B.3
-
31
-
-
33846200465
-
Lattice basis reduction: improved practical algorithms and solving subset sum problems
-
Schnorr, C. P., Euchner, M.: Lattice basis reduction: improved practical algorithms and solving subset sum problems. Math. Program. 66(1-3), 181-199 (1994).
-
(1994)
Math. Program.
, vol.66
, Issue.1-3
, pp. 181-199
-
-
Schnorr, C.P.1
Euchner, M.2
|